Markup Overlap: a Review and a Horse

Total Page:16

File Type:pdf, Size:1020Kb

Markup Overlap: a Review and a Horse Extreme Markup Languages 2004® Montréal, Québec August 2-6, 2004 Markup Overlap: A Review and a Horse Steven DeRose Bible Technologies Group Abstract "Overlap" is the common term for cases where some markup structures do not nest neatly into others, such as when a quotation starts in the middle of one paragraph and ends in the middle of the next. OSIS [Duru03], a standard XML schema for Biblical and related materials, has to deal with extreme amounts of overlap. The simplest case involves book/chapter/verse and book/story/ paragraph hierarchies that pervasively diverge; but many types of overlap are more complicated than this. The basic options for dealing with overlap in the context of SGML [ISO 8879] or XML [Bray98] are described in the TEI Guidelines [TEI]. I summarize these with their strengths and weaknesses. Previous proposals for expressing overlap, or at least kinds of overlap, don't work well enough for the severe and frequent cases found in OSIS. Thus, I present a variation on TEI milestone markup that has several advantages. This is now the normative way of encoding non-hierarchical structures in OSIS documents. Markup Overlap: A Review and a Horse Table of Contents Introduction.......................................................................................................................................1 The problem types.............................................................................................................................1 Evaluation criteria.............................................................................................................................2 Some available solution types ..........................................................................................................3 SGML CONCUR .......................................................................................................................3 Segmentation...............................................................................................................................4 MECS [Sper98]...........................................................................................................................4 JITTs...........................................................................................................................................4 Joins............................................................................................................................................5 Standoff markup..........................................................................................................................5 TEI-style Milestones...................................................................................................................6 Differing type of milestones..............................................................................................................7 Catching Hell'n tagging ....................................................................................................................7 CLIX and LMNL..............................................................................................................................8 Creating CLIX from LMNL........................................................................................................9 On ordering identical ranges.......................................................................................................9 Ranges co-terminous at only one end........................................................................................11 Range ordering with and without co-located endpoints............................................................11 Canonical ordering in CLIX......................................................................................................12 Creating better XML from CLIX..............................................................................................13 Implementations..............................................................................................................................13 Summary.........................................................................................................................................13 Acknowledgements.........................................................................................................................14 Bibliography....................................................................................................................................14 The Author......................................................................................................................................15 Markup Overlap: A Review and a Horse Markup Overlap: A Review and a Horse Steven DeRose § Introduction "Overlap" describes cases where some markup structures do not nest neatly into others, such as when a quotation starts in the middle of one paragraph and ends in the middle of the next. OSIS [Duru03], a standard XML schema for Biblical and related materials, has to deal with extreme amounts of overlap. The simplest is book/chapter/verse and book/story/paragraph hierarchies that pervasively diverge; but many types of overlap are more complicated than this. The basic options for dealing with overlap in the context of SGML [ISO 8879] or XML [Bray98] are described in the TEI Guidelines [TEI]. I summarize these with their strengths and weaknesses. Previous proposals for expressing overlap, or at least kinds of overlap, don't work well enough for the severe and frequent cases found in OSIS. Thus, I present a variation on TEI milestone markup that has several advantages, though it is not a panacea. This is now the normative way of encoding non-hierarchical structures in OSIS documents. § The problem types The simplest type of non-hierarchical structure is the union of multiple structures, each of which is hierarchical. In this case, if you discard all the markup for all but one of the structures, the one structure remaining is a non-problematic hierarchy. For example, the Biblical book/chapter/verse and book/story/ paragraph/sentence hierarchies are essentially independent below the level of book (which must be identical across the hierarchies). A particularly nasty case of such overlap arises when one kind of component crosses many others, as sometimes happens with quotes. The example below shows a typical case from the Biblical book of Jeremiah, and one way to encode it by segmenting the non-hierarchical quotes into parts that are hierarchical, then co-indexing the parts of each logical quote by assigning them the same value for the "splitID" attribute. First, consider the passage without markup. The parenthesized numbers indicate where each numbered verse begins; indentation indicates nested quotations. (1) Moreover the word of the LORD came to me, saying, (2) Go and cry in the hearing of Jerusalem, saying, Thus says the LORD: I remember you, The kindness of your youth, The love of your betrothal, When you went after Me in the wilderness, In a land not sown. (3) Israel [was] holiness to the LORD, The firstfruits of His increase. All that devour him will offend; Disaster will come upon them, says the LORD. (4).... The difficulty is that verse 3 begins in the middle of a third-level nested quote. In a hierarchy, ending verse 2 forces ending the three quotes as well. Then as verse 3 begins all those quotes must be re- opened. Further, it is important to encode somehow that the three quotes opened at the start of verse 3 are not just any three quotes, but exactly the same ones that were closed to end verse 2. Put another way, these quotes should not logically have closed at the verse boundary at all -- if they close it is because of syntax limitations. Below is the marked-up equivalent, where distinct physical parts of each single logical quote are co-labeled using values of the splitID attribute: <div> <p> <verse osisID="Jer.2.1">Moreover the word Extreme Markup Languages 2004® page 1 DeRose of the LORD came to me, saying,</verse> <verse osisID="Jer.2.2"> <q splitID="Q-Jer.2.2-A">Go and cry in the hearing of Jerusalem, saying, <q splitID="Q-Jer.2.2-B">Thus says the LORD: <q splitID="Q-Jer.2.2-C">I remember you, The kindness of your youth, The love of your betrothal, When you went after Me in the wilderness, In a land not sown. </q> </q> </q> </verse> <verse osisID="Jer.2.3"> <q splitID="Q-Jer.2.2-A"> <q splitID="Q-Jer.2.2-B"> <q splitID="Q-Jer.2.2-C">Israel [was] holiness to the LORD, The firstfruits of His increase. All that devour him will offend; Disaster will come upon them,</q> <!--True Close Q-Jer.2.2-C--> says the LORD.</q> <!-- True Close Q-Jer.2.2-B --> </q> <!--NO True Close Q-Jer.2.2-A --> </verse> </p> ... This sort of case is commonly advanced to show that the "Ordered Hierarchy of Content Objects" model does not suffice [see Dura96, Rene95]. It does show that, but it remains simple enough that theories and systems of multiple simple hierarchies remain viable. Somewhat more complicated are cases where components of what is arguably the same hierarchy can remain open beyond the end of the component in which they began, but instances of the same component type can never overlap each other. This may not seem to be a natural category because it depends on the details of particular schema; but it is a common class: even quotations operate this way. Quotes generally do not partially overlap other quotes, although they may overlap many other structures and may be arbitrarily nested. This model is very close to that of MECS [Sper98] and permits some
Recommended publications
  • THE TEXT ENCODING INITIATIVE Edward
    THE TEXT ENCODING INITIATIVE Edward Vanhoutte & Ron Van den Branden Centre for Scholarly Editing and Document Studies Royal Academy of Dutch Language and Literature - Belgium Koningstraat 18 9000 Gent Belgium [email protected] [email protected] KEYWORDS: text-encoding, markup, markup languages, XML, humanities Preprint © Edward Vanhoutte & Ron Van den Branden - The Text Encoding Initiative Bates & Maack (eds.), Encyclopedia of Library and Information Sciences - 1 ABSTRACT The result of community efforts among computing humanists, the Text Encoding Initiative or TEI is the de facto standard for the encoding of texts in the humanities. This article explains the historical context of the TEI, its ground principles, history, and organisation. Preprint © Edward Vanhoutte & Ron Van den Branden - The Text Encoding Initiative Bates & Maack (eds.), Encyclopedia of Library and Information Sciences - 2 INTRODUCTION The Text Encoding Initiative (TEI) is a standard for the representation of textual material in digital form through the means of text encoding. This standard is the collaborative product of a community of scholars, chiefly from the humanities, social sciences, and linguistics who are organized in the TEI Consortium (TEI-C <http://www.tei-c.org>). The TEI Consortium is a non-profit membership organisation and governs a wide variety of activities such as the development, publication, and maintenance of the text encoding standard documented in the TEI Guidelines, the discussion and development of the standard on the TEI mailing list (TEI-L) and in Special Interest Groups (SIG), the gathering of the TEI community on yearly members meetings, and the promotion of the standard in publications, on workshops, training courses, colloquia, and conferences.
    [Show full text]
  • Towards a Content-Based Billing Model: the Synergy Between Access Control and Billing
    TOWARDS A CONTENT-BASED BILLING MODEL: THE SYNERGY BETWEEN ACCESS CONTROL AND BILLING Peter J. de Villiers and Reinhardt A. Botha Faculty of Computer Studies, Port Elizabeth Technikon, Port Elizabeth [email protected], [email protected] Abstract In the internet environment the importance of content has grown. This has brought about a change in emphasis to provide content-based ser- vices in addition to traditional Internet transactions and services. The introduction of content-based services is the key to increase revenues. To e®ectively increase revenues through content-based services e±cient billing systems need to be implemented. This paper will investigate a presumed synergy between access control and billing. The investigation identi¯es three phases. Subsequently the similarities and di®erences be- tween access control and billing in each of these phases are investigated. This investigation assumes that information delivery takes place in an XML format. Keywords: access control, billing, XML 1. INTRODUCTION The global economy has made a transition from an economy with an industrial focus to being an economy based on knowledge and infor- mation. This new paradigm is enabled by the use of Information and Communication Technologies (ICT). The increasing pace of technological innovations in the ¯eld of ICT has given rise to new ways of communicating, learning and conducting business. The Internet has facilitated the establishment of a "borderless" environment for communications and the electronic delivery of certain services. This is known as electronic business (e-business). Electronic business is the key to doing business in the new global economy that is based on knowledge and information [15].
    [Show full text]
  • 3.4 the Extensible Markup Language (XML)
    TEI BY EXAMPLE MODULE 0: INTRODUCTION TO TEXT ENCODING AND THE TEI Edward Vanhoutte Ron Van den Branden Melissa Terras Centre for Scholarly Editing and Document Studies (CTB) , Royal Academy of Dutch Language and Literature, Belgium, Gent, 9 July 2010 Last updated September 2020 Licensed under a Creative Commons Attribution ShareAlike 3.0 License Module 0: Introduction to Text Encoding and the TEI TABLE OF CONTENTS 1. Introduction....................................................................................................................................................................1 2. Text Encoding in the Humanities...............................................................................................................................2 3. Markup Languages in the Humanities.......................................................................................................................3 3.1 Procedural and Descriptive Markup.................................................................................................................... 3 3.2 Early Attempts......................................................................................................................................................... 3 3.3 The Standard Generalized Markup Language (SGML)...................................................................................... 4 3.4 The eXtensible Markup Language (XML)............................................................................................................5 4. XML: Ground Rules........................................................................................................................................................5
    [Show full text]
  • A Personal Research Agent for Semantic Knowledge Management of Scientific Literature
    A Personal Research Agent for Semantic Knowledge Management of Scientific Literature Bahar Sateli A Thesis in the Department of Computer Science and Software Engineering Presented in Partial Fulfillment of the Requirements For the Degree of Doctor of Philosophy (Computer Science) at Concordia University Montréal, Québec, Canada February 2018 c Bahar Sateli, 2018 Concordia University School of Graduate Studies This is to certify that the thesis prepared By: Bahar Sateli Entitled: A Personal Research Agent for Semantic Knowledge Management of Scientific Literature and submitted in partial fulfillment of the requirements for the degree of Doctor of Philosophy (Computer Science) complies with the regulations of this University and meets the accepted standards with respect to originality and quality. Signed by the final examining commitee: Chair Dr. Georgios Vatistas External Examiner Dr. Guy Lapalme Examiner Dr. Ferhat Khendek Examiner Dr. Volker Haarslev Examiner Dr. Juergen Rilling Supervisor Dr. René Witte Approved by Dr. Volker Haarslev, Graduate Program Director 9 April 2018 Dr. Amir Asif, Dean Faculty of Engineering and Computer Science Abstract A Personal Research Agent for Semantic Knowledge Management of Scientific Literature Bahar Sateli, Ph.D. Concordia University, 2018 The unprecedented rate of scientific publications is a major threat to the productivity of knowledge workers, who rely on scrutinizing the latest scientific discoveries for their daily tasks. Online digital libraries, academic publishing databases and open access repositories grant access to a plethora of information that can overwhelm a researcher, who is looking to obtain fine-grained knowledge relevant for her task at hand. This overload of information has encouraged researchers from various disciplines to look for new approaches in extracting, organizing, and managing knowledge from the immense amount of available literature in ever-growing repositories.
    [Show full text]
  • Never the Same Stream: Netomat, Xlink, and Metaphors of Web Documents Colin Post Patrick Golden Ryan Shaw
    Never the Same Stream: netomat, XLink, and Metaphors of Web Documents Colin Post Patrick Golden Ryan Shaw University of North Carolina at University of North Carolina at University of North Carolina at Chapel Hill Chapel Hill Chapel Hill School of Information and School of Information and School of Information and Library Science Library Science Library Science [email protected] [email protected] [email protected] ABSTRACT value for designers and engineers of studying “paths not taken” during the history of the technologies we work on today. Document engineering employs practices of modeling and representation that ultimately rely on metaphors. Choices KEYWORDS among possible metaphors, however, often receive less Hypertext; XLink; browsers; XML; digital art attention than choices driven by practical requirements such as performance or usability. Contemporary debates over how to meet practical requirements always presume some shared 1 Introduction metaphors, making them hard to discern from the surrounding context in which the engineering tasks take place. One way to The metaphor of the printed page has been a prominent address this issue is by taking a historical perspective. In this and indeed from the earliest implementations of hypertext. paper, we attend to metaphorical choices by comparing two structuring principle of Web documentsd hypertext since in the contrast �irst browser, to the historical case studies of “failed” designs for hypertext on the printed page, as whatever “could not conveniently be netomat (1999), a Web browser created preAlthoughsented Nelsonor represented �irst de�ine on paper” [29, page 96], many by the artist Maciej Wisniewski, which responded to search subsequent hypertext systems treated documents as queriesWeb.
    [Show full text]
  • Streaming-Based Processing of Secured XML Documents
    Streaming-based Processing of Secured XML Documents Chair for Network- and Data Security Horst Görtz Institute for IT Security Ruhr-University Bochum Juraj Somorovský Matriculation Number: 108 006 245 025 2.10.2009 Supervisors: Prof. Jörg Schwenk Dipl.-Inf. Meiko Jensen Eidesstattliche Erklärung Ich versichere hiermit, dass ich meine Masterarbeit mit dem Thema Streaming-based Processing of Secured XML Documents selbständig verfasst und keine anderen als die angegebenen Quellen und Hilfsmittel benutzt habe. Die Arbeit wurde bisher keiner anderen Prüfungsbehörde vorgelegt und auch nicht veröentlicht. Bochum, den 2. Oktober 2009 Abstract WS-Security is a standard providing message-level security in Web Services. It allows exible application of security mechanisms in SOAP messages. Therewith it ensures their integrity, condentiality and authenticity. However, using sophisticated security algorithms can lead to high memory consumptions and long evaluation times. In the combination with the standard XML DOM processing approach the Web Services servers become a simple target of Denial-of-Service attacks. This thesis presents a solution for these problems an external streaming-based WS-Security Gateway. First the diculties and limitations of the streaming-based approach applied on secured XML documents are discussed. Then the implementation of the WS-Security Gateway is presented. The implementation is capable of processing XML signatures in SOAP messages. The evaluation shows that streaming-based approach enhances the performance and is much more ecient in comparison to standard DOM-based frameworks. It is also proved that the implementation is under certain circumstances resistant against signature wrapping attacks. Contents 1 Introduction1 2 Related work3 2.1 XML Signature .
    [Show full text]
  • Semantic Web Technologies and Legal Scholarly Publishing Law, Governance and Technology Series
    Semantic Web Technologies and Legal Scholarly Publishing Law, Governance and Technology Series VOLUME 15 Series Editors: POMPEU CASANOVAS, Institute of Law and Technology, UAB, Spain GIOVANNI SARTOR, University of Bologna (Faculty of Law – CIRSFID) and European, University Institute of Florence, Italy Scientific Advisory Board: GIANMARIA AJANI, University of Turin, Italy; KEVIN ASHLEY, University of Pittsburgh, USA; KATIE ATKINSON, University of Liverpool, UK; TREVOR J.M. BENCH-CAPON, University of Liv- erpool, UK; V. RICHARDS BENJAMINS, Telefonica, Spain; GUIDO BOELLA, Universita’degli Studi di Torino, Italy; JOOST BREUKER, Universiteit van Amsterdam, The Netherlands; DANIÈLE BOUR- CIER, University of Paris 2-CERSA, France; TOM BRUCE, Cornell University, USA; NURIA CASEL- LAS, Institute of Law and Technology, UAB, Spain; CRISTIANO CASTELFRANCHI, ISTC-CNR, Italy; JACK G. CONRAD, Thomson Reuters, USA; ROSARIA CONTE, ISTC-CNR, Italy; FRAN- CESCO CONTINI, IRSIG-CNR, Italy; JESÚS CONTRERAS, iSOCO, Spain; JOHN DAVIES, British Telecommunications plc, UK; JOHN DOMINGUE, The Open University, UK; JAIME DELGADO, Uni- versitat Politécnica de Catalunya, Spain; MARCO FABRI, IRSIG-CNR, Italy; DIETER FENSEL, Uni- versity of Innsbruck, Austria; ENRICO FRANCESCONI, ITTIG-CNR, Italy; FERNANDO GALINDO, Universidad de Zaragoza, Spain; ALDO GANGEMI, ISTC-CNR, Italy; MICHAEL GENESERETH, Stanford University, USA; ASUNCIÓN GÓMEZ-PÉREZ, Universidad Politécnica de Madrid, Spain; THOMAS F. GORDON, Fraunhofer FOKUS, Germany; GUIDO GOVERNATORI, NICTA, Australia; GRAHAM
    [Show full text]
  • Proceedings of Balisage: the Markup Conference 2012
    Published in: Proceedings of Balisage: The Markup Conference 2012. at: http://www.balisage.net/Proceedings/vol6/print/Witt01/BalisageVol6- Witt01.html (downloaded on: 15.02.2017/14:19). Balisage: The Markup Conference 2012 Proceedings A standards-related web-based The Markup Conference M information system Maik Stührenberg Institut für Deutsche Sprache (IDS) Mannheim Universität Bielefeld <maik.Stuehrenberg0uni-bielefeld.de> Oliver Schonefeld Institut für Deutsche Sprache (IDS) Mannheim <[email protected]> Andreas Witt Institut für Deutsche Sprache (IDS) Mannheim <witt0 ids-mannheim.de> Bcilisage: The Markup Conference 2012 August 7 - 10, 2012 Copyright © 2012 by the authors. Used with permission. Howto cite this paper Stührenberg, Maik, Oliver Schonefeld and Andreas Witt. “A standards-related web-based information system.” Presented at Balisage: The Markup Conference 2012, Montreal, Canada, August 7-10, 2012. In Proceedings ofBalisage: The Markup Conference 2012. Balisage Series on Markup Technologies, vol. 8 (2012). DOI: io.4242/Baiisagevoi8.stuhrenbergoi. Abstract This late breaking proposal introduces the prototype of a web-based information system dealing with standards in the field of annotation. Table of Contents Introduction The problem with standards Providing guidance Information structure Representation Current state and future work Introduction This late breaking proposal is based on an ongoing effort started in the CLARIN project and which was presented briefly at the LREC 2012 Workshop on Collaborative Resource Development and Delivery. Initial point was the development of an easy to use information system for the description of standards developed in ISO/IEC TC37/SC4 Language Resources Management. Since these standards are heavily related to each other it is usually not feasible to adopt only a single standard for one's work but to dive into the standards jungle in full.
    [Show full text]
  • Towards the Unification of Formats for Overlapping Markup
    Towards the unification of formats for overlapping markup Paolo Marinelli∗ Fabio Vitali∗ Stefano Zacchiroli∗ [email protected] [email protected] [email protected] Abstract Overlapping markup refers to the issue of how to represent data structures more expressive than trees|for example direct acyclic graphs|using markup (meta-)languages which have been designed with trees in mind|for example XML. In this paper we observe that the state of the art in overlapping markup is far from being the widespread and consistent stack of standards and technologies readily available for XML and develop a roadmap for closing the gap. In particular we present in the paper the design and implementation of what we believe to be the first needed step, namely: a syntactic conversion framework among the plethora of overlapping markup serialization formats. The algorithms needed to perform the various conversions are presented in pseudo-code, they are meant to be used as blueprints for re- searchers and practitioners which need to write batch translation programs from one format to the other. 1 Introduction This paper is about markup, one of the key technological ingredient of hypertext. The particular aspects of markup we are concerned with are the limits of its expressivity. XML-based markup requires that the identified features of a document are organized hierarchically as a single tree, whereby each fragment of the content of the document is contained in one and only one XML element, each of which is contained within one and only one parent element all the way up to the single root element at the top.
    [Show full text]
  • Standoff Markup Peter L
    Enhancing composite Digital Documents Using XML-based Standoff Markup Peter L. Thomas David F. Brailsford Document Engineering Laboratory Document Engineering Laboratory School of Computer Science School of Computer Science University of Nottingham University of Nottingham Nottingham, NG8 1BB, UK Nottingham, NG8 1BB, UK [email protected] [email protected] ABSTRACT 1. INTRODUCTION Document representations can rapidly become unwieldy if they In two previous papers [1, 2] we have set out techniques for try to encapsulate all possible document properties, ranging using XML templates as a guide for embedding customised from abstract structure to detailed rendering and layout. structure into PDF files. A Structured PDF file usually marks up its PDF content with the Adobe Standard Structured Tagset We present a composite document approach wherein an XML- (SST). The SST Tags (see [3]) are roughly equivalent to those based document representation is linked via a ‘shadow tree’ of in HTML in that they denote document components such as bi-directional pointers to a PDF representation of the same paragraphs, titles, headings etc. Unlike XML, it is not possible document. Using a two-window viewer any material selected to directly intermix SST tags and PDF content. Instead, the in the PDF can be related back to the corresponding material in tags comprise the nodes of a separate structure tree and each of the XML, and vice versa. In this way the treatment of specialist these nodes contains a pointer to a linked list of marked material such as mathematics, music or chemistry (e.g. via ‘read content within the PDF itself.
    [Show full text]
  • The MLCD Overlap Corpus (MOC)
    Digital Humanities 2010 The MLCD Overlap Corpus semantic openness of SGML and XML to supply non-hierarchical interpretation of what (MOC) are often thought to be inescapably hierarchical notations. Huitfeldt, Claus The SGML/XML-based approaches to overlap [email protected] fall, roughly, into three groups: milestones, Department of Philosophy, University of fragmentation-and-reconstitution, and stand- Bergen off annotation. Milestones (described as early as Sperberg-McQueen, C. M. (Barnard et al. 1988), and used in (Sperberg- [email protected] McQueen and Burnard 1990) and later versions Black Mesa Technologies LLC, USA of the TEI Guidelines) use empty elements to Marcoux, Yves mark the boundaries of regions which cannot be marked simply as elements because they [email protected] overlap the boundaries of other elements. More Université de Montréal, Canada recently, approaches to milestone markup have been generalized in the Trojan Horse and CLIX markup idioms (DeRose 2004). For some time, theorists and practitioners Fragmentation is the technique of dividing of descriptive markup have been aware that a logical unit which overlaps other units the strict hierarchical organization of elements into several smaller units, which do not; the provided by SGML and XML represents a consuming application can then re-aggregate potentially problematic abstraction. The nesting the fragments. structures of SGML and XML capture an important property of real texts and represent Stand-off annotation addresses the overlap a successful combination of expressive power problem by removing the markup from the main and tractability. But not all textual phenomena data stream of the document, at the same time appear in properly nested form, and for more adding pointers back into the base data.
    [Show full text]
  • Enhancing the Security of Applications Using XML-Based Technologies
    Enhancing the Security of Applications using XML-based Technologies Syed I Ahmed Signal Stream Inc. Signal Stream Inc. 580 Wilkie Drive Orleans, Ontario. K4A 1N3 CANADA Project Manager: S. Dahel 613-993-9949 Contract Number: W7714-3-08506 Contract Scientific Authority: S. Dahel 613-993-9949 DEFENCE R&D CANADA - OTTAWA Contractor Report DRDC Ottawa CR 2003-201 December 2003 The scientific or technical validity of this Contractor Report is entirely the responsibility of the contractor and the contents do not necessarily have the approval or endorsement of Defence R&D Canada. Abstract XML and associated core family of XML based W3C Recommendations have no built-in information security features but have rich characteristics that can be ex- ploited to devise numerous security schemes. The evolving XML Security Stan- dards and COTS tools that can enhance the security of applications are identified. DRDC Ottawa CR 2003-201 i This page intentionally left blank. ii DRDC Ottawa CR 2003-201 TABLE OF CONTENTS 1. EXECUTIVE SUMMARY ................................................................................................................. 1 2. REPORT ON PHASE- I WORK ....................................................................................................... 3 2.1 Research Approach....................................................................................................................... 3 2.2 The concept of information security.............................................................................................. 3 2.3
    [Show full text]